CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Evaluation of Cybercrime Economy via MCDM and Decision Tree Approaches: The Case of Zonguldak
Authors
A Coleman
AJ Viera
+27 more
AS Albayrak
AS Albayrak
BM Fleisher
C Hamzaçebi
DL Jamet
E Venkatesan
F Ecer
G Canbek
G Canbek
GR Jahanshahloo
GS Becker
H Aksu
H Hekim
KD Mitnick
M Pekkaya
M Pekkaya
M Pekkaya
M Ture
O Dolu
O Özdoğan
R Broadhurst
RM Kadir
S Aksoy
S Aydın
SW Brenner
T Bhuvaneswari
Y Vural
Publication date
1 January 2020
Publisher
'Springer Science and Business Media LLC'
Doi
Cite
Abstract
One of the most important economic problems that developed/ing countries are facing today is the informal economy. Unregistered economic activities are generally defined as all economic activities that are not included in national accounts. The informal economy has an informal structure as well as a criminal structure. Cyber-attack/s (CA) are increasing day by day as an important part of the informal economy due to the economic effects they produce. Credit card fraud, emptying a bank account, cryptolocker viruses that can be used to encrypt data on the user’s computer, the use of websites and e-commerce sites such as DDOS attacks, espionage, information smuggling, and many new computing crimes can be given as examples in this field. This study aims to evaluate the relations/determiners of CA-damages and information technology (IT) investments to firms’ economics and present the findings to the researchers/decision makers. In this sense, IT investments and CA/CA costs to 321 Zonguldak firms having more than 20 employees in 2016 have been surveyed by Turkish Statistical Institute. According to CA-damage severity indexes generated via TOPSIS, statistical methods and decision tree approaches supported by regression analysis are used in the analysis. According to the analysis, CA-damage increased as IT investments increased. IT investments dimensions’ existence of “website/mobile applications” and “IT policy implementation” accepted the main CA-damage determiners. Meanwhile, the firm’s less usage of firewalls/IPS/IDS indicates that CA are not fully understood, and the security policies’ application is also important along with its preparation. © 2020, Springer Nature Switzerland AG
Similar works
Full text
Available Versions
Crossref
See this paper in CORE
Go to the repository landing page
Download from data provider
Last time updated on 10/08/2021
Zonguldak Bülent Ecevit University Institutional Repository
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:acikarsiv.beun.edu.tr:20.5...
Last time updated on 05/02/2020